Video copy-move forgery detection scheme based on displacement paths
Sophisticated digital video editing tools has made it easier to tamper real videos and create perceptually indistinguishable fake ones. Even worse, some post-processing effects, which include object insertion and deletion in order to mimic or hide a specific event in the video frames, are also preva...
| Auteur principal: | Ibrahim, Omar Ismael |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2017
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/81700/1/OmarIsmaelIbrahimPFC2017.pdf |
Documents similaires
Graphics processing unit based parallel copy move image forgery detection scheme
par: Zulkurnain, Ahmad Uways
Publié: (2015)
par: Zulkurnain, Ahmad Uways
Publié: (2015)
Coarse-to-fine copy-move image forgery detection method based on discrete cosine transform
par: Mohd. Azol, Mas Elyna
Publié: (2016)
par: Mohd. Azol, Mas Elyna
Publié: (2016)
Enhanced dominated completed median ternary pattern for detection of copy-move image forgery against post-processing operations
par: Muhamad, Rafidah
Publié: (2020)
par: Muhamad, Rafidah
Publié: (2020)
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
par: Somayeh, Sadeghi
Publié: (2015)
par: Somayeh, Sadeghi
Publié: (2015)
Enhanced copy-paste image forgery detection based on archimedean spiral and coarse-to-fine approach
par: Sekeh, Mohammad Akbarpour
Publié: (2013)
par: Sekeh, Mohammad Akbarpour
Publié: (2013)
Image forensic for digital image copy move forgery detection
par: Yeap, Yong Yew
Publié: (2018)
par: Yeap, Yong Yew
Publié: (2018)
Enhanced Block-Based Copy-Move Image Forgery Detection Using K-Means Clustering Technique
par: Mohammed Abdo Al-Qershi, Osamah
Publié: (2018)
par: Mohammed Abdo Al-Qershi, Osamah
Publié: (2018)
Passive video forgery detection using frame correlation statistical features / Aminu Mustapha Bagiwa
par: Aminu Mustapha, Bagiwa
Publié: (2017)
par: Aminu Mustapha, Bagiwa
Publié: (2017)
Copy-move forgery detection using overlapping block approach with fusion of zernike moment and dct transform
par: Majid, Gelareh
Publié: (2014)
par: Majid, Gelareh
Publié: (2014)
Feature base fusion for splicing forgery detection based on neuro fuzzy
par: Hadigheh, Habib Ghaffari
Publié: (2014)
par: Hadigheh, Habib Ghaffari
Publié: (2014)
Moving object segmentation in video sequences using vector quantization
par: Khastavaneh, Hassan
Publié: (2013)
par: Khastavaneh, Hassan
Publié: (2013)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
par: Diaa , Mohammed Hassan Uliyan
Publié: (2016)
par: Diaa , Mohammed Hassan Uliyan
Publié: (2016)
Printed document forgery detection using text reordering and mixing of matrices in zero watermarking
par: Husain, Affandi
Publié: (2015)
par: Husain, Affandi
Publié: (2015)
Service quality optimisation scheme of mobile video stream service
par: Herman, Herman
Publié: (2015)
par: Herman, Herman
Publié: (2015)
Online modules: novel model in serial-based method of software copy protection
par: Hakimi, Ahmad Ghadiri
Publié: (2013)
par: Hakimi, Ahmad Ghadiri
Publié: (2013)
Autonomous underwater vehicle path planning data aggregation scheme for underwater linear sensor network
par: Ahmad, Zahoor
Publié: (2019)
par: Ahmad, Zahoor
Publié: (2019)
Fixed channel allocation schemes based on the Floyd's shortest path algorithm
par: Goh, Kelvin Tee Hiong
Publié: (2001)
par: Goh, Kelvin Tee Hiong
Publié: (2001)
New human action recognition scheme with geometrical feature representation and invariant discretization for video surveillance
par: Amir Sjarif, Nilam Nur
Publié: (2015)
par: Amir Sjarif, Nilam Nur
Publié: (2015)
A scheme for efficient peer-to-peer live video streaming over wireless mesh networks
par: Barekatain, Behrang
Publié: (2014)
par: Barekatain, Behrang
Publié: (2014)
An adaptive and distributed intrusion detection scheme for cloud computing
par: Ibrahim, Nurudeen Mahmud
Publié: (2019)
par: Ibrahim, Nurudeen Mahmud
Publié: (2019)
Shortest Path Trajectory System Based on Dijkstra Algorithm
par: Putri, Indah Pratiwi
Publié: (2012)
par: Putri, Indah Pratiwi
Publié: (2012)
Moving object detection and tracking from video sequence :
an analysis between canny edge detection and active contour technique / Mohd Anuar Mohd Salleh
par: Mohd Salleh, Mohd Anuar
Publié: (2006)
par: Mohd Salleh, Mohd Anuar
Publié: (2006)
Distributed anomaly detection scheme based on lightweight data aggregation in wireless sensor network
par: Mohd. Zamry, Nurfazrina
Publié: (2022)
par: Mohd. Zamry, Nurfazrina
Publié: (2022)
Modeling and querying alternative paths in Kuantan
par: Mohamad Salleh, Mazlina
Publié: (2007)
par: Mohamad Salleh, Mazlina
Publié: (2007)
"Do it yourself moves and changes" PBXoIP system
par: Abd. Rahman, Farah Adibah
Publié: (2006)
par: Abd. Rahman, Farah Adibah
Publié: (2006)
Optimal path planning algorithms in virtual environments
par: Hassan, Rohayanti
Publié: (2006)
par: Hassan, Rohayanti
Publié: (2006)
Predictive analytics for fast moving item using nonlinear regresssion models
par: Mohd. Azhar, Nur Arisha
Publié: (2021)
par: Mohd. Azhar, Nur Arisha
Publié: (2021)
Comparison and fusion of retrieval schemes based on different structures, similarity measures and weighting schemes
par: Wahlan, Mohammed Salem Farag
Publié: (2006)
par: Wahlan, Mohammed Salem Farag
Publié: (2006)
Proxcache: A new cache deployment strategy in information-centric network for mitigating path and content redundancy
par: Ibrahim, Abdullahi
Publié: (2016)
par: Ibrahim, Abdullahi
Publié: (2016)
Multimodal biometrics scheme based on discretized eigen feature fusion for identical twins identification
par: Mohammed, Bayan Omar
Publié: (2020)
par: Mohammed, Bayan Omar
Publié: (2020)
Comparison of retrieval schemes based on different structure and similarity measures for Malaysia's fatwa
par: Ibrahim, Mohd. Nazri
Publié: (2007)
par: Ibrahim, Mohd. Nazri
Publié: (2007)
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
par: Omar Abdulmaged, Hammood
Publié: (2022)
par: Omar Abdulmaged, Hammood
Publié: (2022)
Image splicing detection scheme using adaptive threshold mean ternary pattern descriptor
par: Abrahim, Araz Rajab
Publié: (2019)
par: Abrahim, Araz Rajab
Publié: (2019)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
par: Halin, Alfian Abdul
Publié: (2011)
par: Halin, Alfian Abdul
Publié: (2011)
A robust video watermarking using simulated block based spatial domain technique
par: Arab, Farnaz
Publié: (2014)
par: Arab, Farnaz
Publié: (2014)
Solving shortest path problem using gravitational search algorithm and neural networks
par: Sinaie, Saman
Publié: (2010)
par: Sinaie, Saman
Publié: (2010)
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
par: Nurul Hani , Nortaja
Publié: (2004)
par: Nurul Hani , Nortaja
Publié: (2004)
Pixel-based dispersal scheme for medical image survivability and confidentiality
par: Nelmiawati, Nelmiawati
Publié: (2014)
par: Nelmiawati, Nelmiawati
Publié: (2014)
Triple scheme based on image steganography to improve imperceptibility and security
par: Hashim, Mohammed Mahdi
Publié: (2022)
par: Hashim, Mohammed Mahdi
Publié: (2022)
Z-path trajectory mechanism for mobile beacon-assisted localization in wireless sensor networks
par: Rezazadeh, Javad
Publié: (2014)
par: Rezazadeh, Javad
Publié: (2014)
Documents similaires
-
Graphics processing unit based parallel copy move image forgery detection scheme
par: Zulkurnain, Ahmad Uways
Publié: (2015) -
Coarse-to-fine copy-move image forgery detection method based on discrete cosine transform
par: Mohd. Azol, Mas Elyna
Publié: (2016) -
Enhanced dominated completed median ternary pattern for detection of copy-move image forgery against post-processing operations
par: Muhamad, Rafidah
Publié: (2020) -
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
par: Somayeh, Sadeghi
Publié: (2015) -
Enhanced copy-paste image forgery detection based on archimedean spiral and coarse-to-fine approach
par: Sekeh, Mohammad Akbarpour
Publié: (2013)